Resources

Webinars

Given the current state of cyber security data breaches, advancements in attacker capabilities and all-too-frequent dumps of new malware and capabilities, it has never been more crucial for organizations to secure themselves. See Webinar...

Learn how modern cybercriminals are actively breaching accounts in public clouds to perform cryptocurrency mining, and how you can take action to prevent this in your AWS cloud environment. See Webinar...

This is Lacework

Lacework AWS Account Security

From initial configuration to compliance assessment and daily operations, Lacework integrates with and augments AWS services to deliver advanced protection to the assets you deploy on AWS.

Lacework AWS Configuration and Compliance

In highly dynamic clouds where workloads and resources get reassigned continuously, the compliance process requires more frequent controls and a different, more automated approach.

Lacework Cloud Workload Security

From workload discovery to threat detection and point-and-click investigation, we automate many security processes so that your cloud stays secure no matter how fast DevOps spins new code and new machines.

Product Videos

Product Overview

The velocity of the cloud is outpacing the ability to keep it safe. That’s why Lacework built a better solution to tackle modern cloud security issues.

Large Networking Firm

Solution Briefs

From initial configuration to daily operations, Lacework protection for AWS S3 buckets provides continuous, automated protection. We make it easy to maintain an effective security posture for your S3 buckets by automating all the configuration checking and highlighting the changes or activities that represent a risk with recommendations on how to fix any security weakness. Read More...

Your security posture can only become predictable once you have established a set of best practices and ensure adherence to these on a continuous basis. Lacework compliance to CIS Benchmark for AWS is a continuous, automated assessment of compliance with recommendations to fix violations. Read More...

Lacework for AWS CloudTrail protects AWS deployments by automatically detecting any anomalous activity. Make sense of the millions of events captured in CloudTrail with no rules, no policies, and no time spent on tedious event analysis. Read More...

Lacework Polygraph solves the breach detection challenge from a completely different perspective. Rather than relying on policies, rules and signatures, we create a deep temporal baseline of cloud operations. We use that baseline to spot anomalies and breaches. Read More...

Cloud security incident investigations are incredibly complex and time consuming. There’s no time to waste: to limit damage and remediate vulnerabilities, security professionals need answers fast. But all too often, investigators confront the aftermath of an attack armed only with incomplete logs. They face a frustrating exercise in manual event correlation that often leads nowhere. Read More...

Lacework Polygraph took a new tack to solve the thorny problem of insider threats. Rather than relying on the rules and policies the power traditional intrusion detection techniques, we create a deep temporal baseline of cloud operations. We use this baseline to spot unusual user behavior and assess its risk – without rules, policies, or log analysis. Read More...

Today’s cloud DevOps teams deploy new applications and services at a blistering pace. What used to take weeks or months now takes days. Lacework automatically captures the true reality of data centers so even major architectural changes can be made at breakneck speed.
Read More...

Designed for high-velocity cloud implementations, Lacework File Integration Monitoring is more than a compliance checklist item. Our FIM solution is designed to be an integral part of your cloud security strategy.
Read More...

Cyber criminals are experts at finding and taking advantage of cloud weakness. Misconfigured cloud resources can lead to disaster, even for the most diligently protected cloud deployments. Read More...

The drive towards a new cloud-centric IT model has created a governance challenge. Leaders must optimize strategies to cope with escalating security threats, evolving compliance requirements and enticing public cloud services. Read More...

With a security operations center, organizations can shorten threat response times and stop breaches before they become damaging. But to get the most out of a SOC, businesses need to monitor every IT asset - including those in the cloud.
Read More...

White Papers

This report describes the risks and threats that can be created by deploying workloads in public cloud without the proper security guardrails, security services, and the systematic use of security best practices. Read More...

Based on quantitative research, as well as qualitative interviews with industry practitioners, this report covers why businesses are increasingly evolving their security strategy to advance their cloud strategy. Read More...

Today’s dynamic cloud environments present new challenges to security practitioners. Tailoring old policy-and-logs approaches to the demands of the cloud require time and resources that organizations don’t have. Read More...